메뉴 건너뛰기




Volumn 2052, Issue , 2001, Pages 287-299

CVS at work: A report on new failures upon some cryptographic protocols

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; KNOWLEDGE MANAGEMENT; NETWORK ARCHITECTURE; PUBLIC KEY CRYPTOGRAPHY;

EID: 35048902864     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45116-1_28     Document Type: Conference Paper
Times cited : (7)

References (27)
  • 2
    • 0002885224 scopus 로고    scopus 로고
    • Prudent Engineering Practice for Cryptographic Protocols
    • Abadi, M. and Needham, R.: Prudent Engineering Practice for Cryptographic Protocols. IEEE Transactions on Software Engineering, 22(1) (January 1996)
    • (1996) IEEE Transactions on Software Engineering , vol.22 January , Issue.1
    • Abadi, M.1    Needham, R.2
  • 8
    • 84955571226 scopus 로고    scopus 로고
    • Analysis of cryptographic protocols: The environment and the application
    • August
    • Durante, A.: Analysis of cryptographic protocols: the environment and the application. In: Proceedings of 15th IFIP SEC 2000. (August 2000)
    • (2000) Proceedings of 15Th IFIP SEC 2000
    • Durante, A.1
  • 12
    • 84974776068 scopus 로고
    • A Classification of Security Properties for Process Algebras
    • Focardi, R. and Gorrieri, R.: A Classification of Security Properties for Process Algebras. Journal of Computer Security, 3(1):5-33 (1995)
    • (1995) Journal of Computer Security , vol.3 , Issue.1 , pp. 5-33
    • Focardi, R.1    Gorrieri, R.2
  • 13
    • 0001439194 scopus 로고    scopus 로고
    • The Compositional Security Checker: A Tool for the Verification of Information Flow Security Properties
    • September
    • Focardi, R. and Gorrieri, R.: The Compositional Security Checker: A Tool for the Verification of Information Flow Security Properties. IEEE Transactions on Software Engineering, 23(9):550-571 (September 1997)
    • (1997) IEEE Transactions on Software Engineering , vol.23 , Issue.9 , pp. 550-571
    • Focardi, R.1    Gorrieri, R.2
  • 14
    • 0003207615 scopus 로고    scopus 로고
    • Non Interference for the Analysis of Cryptographic Protocols
    • LNCS 1853 (July
    • Focardi, R., Gorrieri, R., and Martinelli, F.: “Non Interference for the Analysis of Cryptographic Protocols". In Proceedings of ICALP' 00. LNCS 1853 (July 2000) 744-755
    • (2000) Proceedings of ICALP' 00 , pp. 744-755
    • Focardi, R.1    Gorrieri, R.2    Martinelli, F.3
  • 17
    • 19144370194 scopus 로고    scopus 로고
    • On the Verification of Cryptographic Protocols - A Tale of Two Committees
    • of ENTCS
    • Gollman, D.: On the Verification of Cryptographic Protocols - A Tale of Two Committees. In: Workshop on secure architectures and information flow. Vol. 32 of ENTCS (2000)
    • (2000) Workshop on Secure Architectures and Information Flow , vol.32
    • Gollman, D.1
  • 20
    • 0030678388 scopus 로고    scopus 로고
    • CASPER: A Compiler for the Analysis of the security protocols
    • Rockport Massachusetts (USA). IEEE Press 18-30 (June
    • Lowe, G.: CASPER: A Compiler for the Analysis of the security protocols. In: Proceedings Tenth IEEE Computer Security Foundation Workshop, (CSFW'97). Rockport Massachusetts (USA). IEEE Press 18-30 (June 1997)
    • (1997) Proceedings Tenth IEEE Computer Security Foundation Workshop, (CSFW'97)
    • Lowe, G.1
  • 21
    • 0030084918 scopus 로고    scopus 로고
    • The NRL Protocol Analyzer: An Overview
    • Meadows, C.: The NRL Protocol Analyzer: An Overview. Journal of Logic Pro- gramming, 26(2):113-131 (1996)
    • (1996) Journal of Logic Pro- Gramming , vol.26 , Issue.2 , pp. 113-131
    • Meadows, C.1
  • 24
    • 84955574180 scopus 로고    scopus 로고
    • Paulson: The Inductive Approach to Verifying Cryptographic Pro- tocols
    • Rockport Massachusetts (USA), IEEE Press. (June
    • Lawrence C. Paulson: The Inductive Approach to Verifying Cryptographic Pro- tocols. In: Proceedings Tenth IEEE Computer Security Foundation Workshop, (CSFW'97), Rockport Massachusetts (USA), IEEE Press. (June 1997)
    • (1997) Proceedings Tenth IEEE Computer Security Foundation Workshop, (CSFW'97)
    • Lawrence, C.1
  • 25
    • 0003855464 scopus 로고    scopus 로고
    • John Wiley & Sons, Inc, second edition
    • Schneier, B.: Applied Cryptography. John Wiley & Sons, Inc. (1996) second edition
    • (1996) Applied Cryptography
    • Schneier, B.1
  • 26
    • 84955591178 scopus 로고    scopus 로고
    • May
    • SET Secure Electronic Transaction LLC. The SET Standard Specification. Available at the URL, http://www.setco.org/set specifications.html (May 1997)
    • (1997) The SET Standard Specification
  • 27
    • 0026630927 scopus 로고
    • Authentication for distributed systems
    • March
    • Woo T.Y.C. and Lam, S.S.: Authentication for distributed systems. Computer, 25:10-10 (March 1992)
    • (1992) Computer , vol.25 , pp. 10-15
    • Woo, T.1    Lam, S.S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.